Method for implementing computer terminal safety admittance based on credible authentication gateway

A computer terminal and computer technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of not being able to verify whether the other party is credible, unable to verify the real identity of the other party, etc., to achieve uniqueness and avoid illegal tampering Effect

Inactive Publication Date: 2008-12-24
瑞达信息安全产业股份有限公司
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of computer networks, the TCP/IP protocol is widely used by the Internet, and the use of MAC and IP to identify terminals between two communication platforms using the TCP/IP protocol is not credible, because MAC and IP can be changed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing computer terminal safety admittance based on credible authentication gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention is further described as follows in conjunction with accompanying drawing and embodiment:

[0022] Such as figure 1 As shown, the described method for realizing security access of a computer terminal based on a trusted authentication gateway, the procedure is as follows: 1), the computer terminal sends an access request to the trusted authentication gateway; 2), the computer terminal sends an access request to the trusted authentication gateway; The gateway registers the basic identity information of the computer terminal, which is composed of hardware feature information and software feature information of the computer terminal; the hardware feature information of the computer terminal is machine identification, network card hardware number, hard disk serial number and hard disk data features , optical drive type and serial number, USB information, sound card information, graphics card information, when the hardware feature information is two of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing the safety admittance of a computer terminal based on a trusted authentication gateway, and belongs to the security technology field of the computer. The method comprises the following procedures: (1) the computer terminal initiates an access request to the gateway; (2) the basic identity information of the computer terminal is registered to the gateway; (3) an active label of the computer terminal is formed by the gateway; (4) the identity and the authority of the active label are verified through the trusted authentication gateway; (5) the trusted authentication gateway judges whether the identity and the authority of the active label are legal or not; (5.1), when the identity and the authority of the active label are illegal, the access of the computer terminal is barred; (5.2), when the identity and the authority of the active label are legal, the access of the computer terminal is permitted. The method has the advantages: firstly, the uniqueness and the identifiability of the identity of the computer terminal to the network are realized; secondly, the possibility that the terminal identification is falsified illegally can be avoided, and the terminal identification can not be forged.

Description

technical field [0001] The invention relates to a method for realizing security access of a computer terminal based on a trusted authentication gateway, which belongs to the technical field of computer security. Background technique [0002] With the development of computer networks, the TCP / IP protocol is widely used by the Internet, and the use of MAC and IP to identify terminals between two communication platforms using the TCP / IP protocol is not credible, because MAC and IP can be changed at will, that is, computer The identity of the terminal in the network can be forged. Therefore, communication entities cannot verify the real identity of the other party during communication, that is, they cannot verify whether the other party is trustworthy. Contents of the invention [0003] The purpose of the present invention is to overcome the shortcomings of the prior art, provide a method for realizing secure access of computer terminals based on a trusted authentication gatew...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 刘毅张大鹏韩勇桥吴庆余乔龚超雄陈碧碧
Owner 瑞达信息安全产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products